International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P118 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P118

Outsourcing with secure accessibility in mobile cloud computing


Monika Waghmare, Prof T.A.Chavan

Citation :

Monika Waghmare, Prof T.A.Chavan, "Outsourcing with secure accessibility in mobile cloud computing," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 526-530, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I4P118

Abstract

Now a days a mobile device like a smart phone is becoming one of the major information processing devices for users. On the other hand, a mobile device is still resource constrained, and some applications, generally demand more resources than a mobile device can pay for. To overcome this, a mobile device should get resources from an external source. One of such sources present is cloud computing platforms. In Mobile Cloud computing generally front-end consist of users who possess mobile devices and back-end cloud servers. This pattern enables users to access a large volume of storage resources with portable devices in a distributed and cooperative manner. In between the times of uploading and downloading files or data, the privacy and integrity of files need to be guaranteed. In this paper a cloud platform is shaped for storage outsourcing, security necessities in mobile cloud are addressed and equivalent algorithms are addressed for guiding off-the-shelf implementation of mobile cloud communications.

Keywords

Mobile cloud computing, cloud computing, cloud servers, mobile devices, integrity, privacy.

References

[1] Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. A Survey of Mobile Cloud Computing: Architecture Applications, and Approaches,In Wireless Communications and Mobile Computing 2011.
[2]  Xu L, Xing T, Zhong Y, et al. Secure data processing framework for mobile cloud computing. In: IEEE INFOCOM 2011 Workshop on Cloud Computing (INFOCOMW11). Shanghai, China, 2011: 711716.
[3] Priyank Singh Hada, Ranjita Singh, Mukul Manmohan.    Security Agents: A Mobile Agent based Trust Model for Cloud Computing.In International Journal of Computer Applications (0975 – 8887) Volume 36– No.12, December 2011
[4] Wei Ren, Linchen Yu, Ren Gao, Feng Xiong.Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing. Tsinghua Science And Technology,ISSNl1007-0214ll06/09llpp520 528.Volume Number 5, October 2011. 16,
[6] Manjunatha A, Ranabahu A, Sheth A, et al. Power of clouds in your pocket: An efficient approach for cloud mobile hybrid application development. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom10). Indianapolis, IN, USA, 2010: 496-503.
[7] Park K W, Kim C, Park K H. Blast: Applying streaming ciphers into outsourced cloud storage. In: 2010 IEEE 16th International Conference on Parallel and Distributed Systems (ICPADS10). Shanghai, China, 2010: 431-437.
[8] Itani W, Kayassi A, Chehab A. Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: 2010 International Conference on Energy Aware Computing (ICEAC10). Cairo, Egypt, 2010: 1-2.
[9] Liu Q, Wang G, Wu J. Efficient sharing of secure cloud storage services. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT10). Bradford, West Yorkshire, UK, 2010: 922-929.